Content deleted Content added
Cleaned article up and brought it up to wikipedia standards. Tag: Reverted |
Citation bot (talk | contribs) Altered pages. Add: bibcode, doi-access, pages, doi-broken-date. Formatted dashes. | Use this bot. Report bugs. | Suggested by Headbomb | #UCB_toolbar Tag: Reverted |
||
Line 32:
* Bayesian filtering support (version 2.50, February 2003)<ref name="sa-2.50">{{cite web|title=SpamAssassin 2.50 Released|url=https://spamassassin.apache.org/news/2003-02-25.html|website=SpamAssassin|date=2003-02-25|access-date=2023-08-23|archive-url=https://web.archive.org/web/20030301000000/https://spamassassin.apache.org/news/2003-02-25.html|archive-date=2003-03-01}}</ref>
* Network-based tests and distributed checksum systems
* Support for SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail)<ref name="email-auth-book">{{cite book|last=Levine|first=John|title=Email Authentication: What It Is and Why It Matters|publisher=Freepress|year=2018|isbn=978-1983433337|pages=
===Apache Foundation adoption===
Line 48:
===Rule types===
SpamAssassin employs several categories of tests:<ref name="packt-guide">{{cite book |first1=Alistair |last1=McDonald |title=SpamAssassin: A Practical Guide to Integration and Configuration |publisher=[[Packt|Packt Publishing]] |edition=1st |pages=
'''Header tests''': Examine email headers for signs of forgery, suspicious routing, or spam software fingerprints.
Line 99:
===Network-based filtering===
SpamAssassin supports numerous network-based tests that leverage the collaborative nature of spam fighting:<ref name="network-tests">{{cite book|title=Combating Spam and Viruses|last=Wolfe|first=Paul|publisher=CRC Press|year=2016|isbn=978-1498749732|pages=
'''DNS-based blacklists (DNSBLs)''': Queries against lists of known spam sources, including:
Line 117:
===Authentication verification===
SpamAssassin verifies several email authentication standards:<ref name="auth-methods">{{cite journal|title=Email Authentication Mechanisms: DMARC, SPF and DKIM|journal=Journal of Computer Security|volume=27|issue=2|pages=
* '''[[Sender Policy Framework|SPF]]''': Validates sending server authorization
* '''[[DomainKeys Identified Mail|DKIM]]''': Verifies cryptographic message signatures
Line 142:
==Performance and scalability==
SpamAssassin's performance depends heavily on configuration and deployment method:<ref name="performance-study">{{cite conference|title=Performance Analysis of Open Source Anti-Spam Systems|conference=Annual IT Security Conference|date=2018-06-15|pages=
'''Processing speed''':
Line 181:
==Limitations and criticism==
Despite its widespread use, SpamAssassin has several limitations:<ref name="limitations-analysis">{{cite journal|title=Comparative Analysis of Anti-Spam Technologies|journal=Network Security|volume=2021|issue=3|pages=
===Performance concerns===
Line 274:
* {{cite book|title=Anti-Spam Techniques Based on Artificial Immune System|last=Tan|first=Ying|publisher=CRC Press|year=2016|isbn=978-1498725387}}
* {{cite book|title=Email Security with Cisco IronPort|last=Bochenek|first=Chris|publisher=Cisco Press|year=2013|isbn=978-1587142925}}
* {{cite journal|title=Machine Learning for Email Spam Filtering: Review, Approaches and Open Research Problems|journal=Heliyon|volume=5|issue=6|year=2019|doi=10.1016/j.heliyon.2019.e01802|last1=Dada|first1=Emmanuel Gbenga|pages=e01802 |doi-access=free |bibcode=2019Heliy...501802D }}
==External links==
|